I have several Supermicro AOC-SIMSO+ IPMI cards that are having problems 
with Serial-over-LAN connections. When I try to connect to a SOL, I just 
get an Unexpected error and the program terminates. Everything else on 
the IPMIs appears to work. I can check status, change network settings, 
and power cycle the boxes. Here is the output of ipmitool with -vv.

sprt:~# ipmitool -vv -I lanplus -H 10.128.42.3 -U ADMIN -P ADMIN sol 
activate
IPMI LAN host 10.128.42.3 port 623

 >> Sending IPMI command payload
 >>    netfn   : 0x06
 >>    command : 0x38
 >>    data    : 0x8e 0x04

 >> sending packet (23 bytes)
 06 00 ff 07 00 00 00 00 00 00 00 00 00 09 20 18
 c8 81 00 38 8e 04 b5
<< Received data (30 bytes)
 06 00 ff 07 00 00 00 00 00 00 00 00 00 10 20 1c
 c4 81 00 38 00 01 84 04 03 00 00 00 00 bb
 >> SENDING AN OPEN SESSION REQUEST

 >> sending packet (48 bytes)
 06 00 ff 07 06 10 00 00 00 00 00 00 00 00 20 00
 00 00 00 00 a4 a3 a2 a0 00 00 00 08 01 00 00 00
 01 00 00 08 01 00 00 00 02 00 00 08 01 00 00 00
<< Received data (52 bytes)
 06 00 ff 07 06 11 00 00 00 00 00 00 00 00 24 00
 00 00 05 00 a4 a3 a2 a0 0e 00 00 00 00 00 00 08
 01 00 00 00 01 00 00 08 01 00 00 00 02 00 00 08
 01 00 00 00
<<OPEN SESSION RESPONSE
<<  Message tag                        : 0x00
<<  RMCP+ status                       : no errors
<<  Maximum privilege level            : oem
<<  Console Session ID                 : 0xa0a2a3a4
<<  BMC Session ID                     : 0x0000000e
<<  Negotiated authenticatin algorithm : hmac_sha1
<<  Negotiated integrity algorithm     : hmac_sha1_96
<<  Negotiated encryption algorithm    : aes_cbc_128

 >> Console generated random number (16 bytes)
 d3 86 af 79 be a3 50 7b a8 17 7f bf 97 b8 d7 17
 >> SENDING A RAKP 1 MESSAGE

 >> sending packet (49 bytes)
 06 00 ff 07 06 12 00 00 00 00 00 00 00 00 21 00
 00 00 00 00 0e 00 00 00 d3 86 af 79 be a3 50 7b
 a8 17 7f bf 97 b8 d7 17 14 00 00 05 41 44 4d 49
 4e
<< Received data (76 bytes)
 06 00 ff 07 06 13 00 00 00 00 00 00 00 00 3c 00
 00 00 00 00 a4 a3 a2 a0 d8 7d b5 b8 15 e6 b9 06
 b4 4a 21 6e 83 b7 21 76 02 30 48 ff fe 9c eb 49
 08 09 0a 0b 0c 0d 0e 0f f6 87 56 79 6c 19 39 0a
 ee 65 c3 a3 14 d4 9b 4d 1a ee 36 cd
<<RAKP 2 MESSAGE
<<  Message tag                   : 0x00
<<  RMCP+ status                  : no errors
<<  Console Session ID            : 0xa0a2a3a4
<<  BMC random number             : 0xd87db5b815e6b906b44a216e83b72176
<<  BMC GUID                      : 0x023048fffe9ceb4908090a0b0c0d0e0f
<<  Key exchange auth code [sha1] : 
0xf68756796c19390aee65c3a314d49b4d1aee36cd

session integrity key input (39 bytes)
 d3 86 af 79 be a3 50 7b a8 17 7f bf 97 b8 d7 17
 d8 7d b5 b8 15 e6 b9 06 b4 4a 21 6e 83 b7 21 76
 14 05 41 44 4d 49 4e
Generated session integrity key (20 bytes)
 3d 2c f6 03 de 04 6f b2 f6 ef 11 c2 d0 d7 2a 98
 03 bf a2 ee
Generated K1 (20 bytes)
 3f f4 34 89 01 35 b7 bb d3 3d 63 a5 95 b8 e7 51
 f5 fc 13 db
Generated K2 (20 bytes)
 1c d2 28 e6 db c5 61 f9 d0 f4 47 c6 db ee 5e 3a
 21 6d 15 35
 >> SENDING A RAKP 3 MESSAGE

 >> sending packet (44 bytes)
 06 00 ff 07 06 14 00 00 00 00 00 00 00 00 1c 00
 00 00 00 00 0e 00 00 00 9b 7f ba 0e 8f 21 b9 cb
 20 1c 1b fb 31 de 6a a0 f8 c3 fc ea
<< Received data (36 bytes)
 06 00 ff 07 06 15 00 00 00 00 00 00 00 00 14 00
 00 00 00 00 a4 a3 a2 a0 4c 00 5a 92 75 d9 7c 65
 f4 8f 4c 74
<<RAKP 4 MESSAGE
<<  Message tag                   : 0x00
<<  RMCP+ status                  : no errors
<<  Console Session ID            : 0xa0a2a3a4
<<  Key exchange auth code [sha1] : 0x4c005a9275d97c65f48f4c74

IPMIv2 / RMCP+ SESSION OPENED SUCCESSFULLY


 >> Sending IPMI command payload
 >>    netfn   : 0x06
 >>    command : 0x3b
 >>    data    : 0x04

 >> sending packet (64 bytes)
 06 00 ff 07 06 c0 0e 00 00 00 03 00 00 00 20 00
 9f 67 75 77 f0 66 89 56 82 01 a8 0c 1d a4 87 60
 be 27 33 fa 76 93 41 54 3d cf 3d e0 ee 06 5d 3e
 ff ff 02 07 a0 10 64 1a 00 45 b1 a0 e6 d7 4c bc
<< Received data (64 bytes)
 06 00 ff 07 06 c0 a4 a3 a2 a0 01 00 00 00 20 00
 d8 7d b5 b8 15 e6 b9 06 b4 4a 21 6e 83 b7 21 76
 16 64 f3 14 2b 20 41 90 ad 44 f0 b2 b9 2b a1 61
 ff ff 02 07 21 cf 49 cc ca 07 ad ad d2 c8 e2 87
Decrypted 16 encrypted bytesDecrypted this data (16 bytes)
 20 1c c4 81 04 3b 00 04 3c 01 02 03 04 05 06 06
Set Session Privilege Level to ADMINISTRATOR


 >> Sending IPMI command payload
 >>    netfn   : 0x06
 >>    command : 0x48
 >>    data    : 0x01 0x01 0xc6 0x00 0x00 0x00

 >> sending packet (64 bytes)
 06 00 ff 07 06 c0 0e 00 00 00 04 00 00 00 20 00
 86 8e 57 3c 3c 27 03 70 16 70 38 aa 2f 85 50 d7
 d0 90 4e 8b 6f 7e 51 68 e3 62 d0 0e 16 03 9b 20
 ff ff 02 07 37 29 9b 26 4e 9f 9f ee 63 c5 cc f3
<< Received data (80 bytes)
 06 00 ff 07 06 c0 a4 a3 a2 a0 02 00 00 00 30 00
 d8 7d b5 b8 15 e6 b9 06 b4 4a 21 6e 83 b7 21 76
 e4 79 ea 9b 1a 0d fd e3 fd cf 67 b0 b4 ae 7f 2e
 09 17 5b 86 40 04 f8 cc 23 3b a4 ae f8 c0 be a7
 ff ff 02 07 db c9 f4 10 ff 61 6d e0 69 d6 3c c4
Decrypted 32 encrypted bytesDecrypted this data (32 bytes)
 20 1c c4 81 08 48 ff 00 00 00 00 00 00 00 00 00
 00 ff ff 32 01 02 03 04 05 06 07 08 09 0a 0b 0b
Error activating SOL payload: Unspecified error

 >> Sending IPMI command payload
 >>    netfn   : 0x06
 >>    command : 0x3c
 >>    data    : 0x0e 0x00 0x00 0x00

 >> sending packet (64 bytes)
 06 00 ff 07 06 c0 0e 00 00 00 05 00 00 00 20 00
 39 00 69 5d ae a5 94 0e 65 56 64 dc ae 64 7b ed
 39 b2 ec cc 87 56 cb f9 52 40 1a ff 24 6c 1f d6
 ff ff 02 07 5f 03 47 3c 82 74 b4 f9 77 f4 e4 cc
<< Received data (64 bytes)
 06 00 ff 07 06 c0 a4 a3 a2 a0 03 00 00 00 20 00
 d8 7d b5 b8 15 e6 b9 06 b4 4a 21 6e 83 b7 21 76
 dc 5e 47 46 bf 51 a4 0e 98 7d 06 d6 b3 87 f9 80
 ff ff 02 07 b1 69 53 e9 78 15 2d 08 a7 08 74 ed
Decrypted 16 encrypted bytesDecrypted this data (16 bytes)
 20 1c c4 81 0c 3c 00 37 01 02 03 04 05 06 07 07
Closed Session 0000000e


The IPMI card is using verion 1.59 of the firmware. Any of you have any 
thoughts on this? Thanks in advanced.

Mike Lovell
m...@mozy.com

------------------------------------------------------------------------------
This SF.net email is sponsored by:
SourcForge Community
SourceForge wants to tell your story.
http://p.sf.net/sfu/sf-spreadtheword
_______________________________________________
Ipmitool-devel mailing list
Ipmitool-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ipmitool-devel

Reply via email to